🔒Security Information

All our endpoints are secured with IP based authentication mechanism, please write an email to our support team for enabling the IP Address of your server.

The authentication for any request involves the below step

  1. Create Json Web Token (JWT) using the Token creation method. Please refer to Token Management APIs for more details.
  2. Pass the JWT Auth Key as Bearer Token to each request